Computer Networking Which of the following is the decimal and hexadecimal equivalents of the binary number 10011101? 157, 0x9D 155, 0x9B 185, 0xB9 159, 0x9F 157, 0x9D 155, 0x9B 185, 0xB9 159, 0x9F ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command will show you the IOS version running on your router? sh running-config sh version sh flash sh IOS sh running-config sh version sh flash sh IOS ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a global unicast address? These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These are like private addresses in IPv4 in that they are not meant to be routed. Packets addressed to a unicast address are delivered to a single interface. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These are like private addresses in IPv4 in that they are not meant to be routed. Packets addressed to a unicast address are delivered to a single interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following command options are displayed when you use the Router# show frame-relay ? command?1. dlci2. neighbors3. lmi4. pvc5. map 3, 4 and 5 2 and 4 1 only All of these 3, 4 and 5 2 and 4 1 only All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred to as: None of these synchronizing modulation demodulation synchronizing None of these synchronizing modulation demodulation synchronizing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? 2 5 4 3 2 5 4 3 ANSWER DOWNLOAD EXAMIANS APP